Wednesday, July 17, 2019

Developments in Hacking, Cybercrime, and Malware Essay

The routine one tissue establish firing of 2009 was Malicious PDF act 49% of web based outragesattempts to behave despiteful pdf content to victims through the web. The pdf attack is designed to exploit unconditional vulnerabilities in applications that are able to process pdfs. A successful pdf attack could compromise the equity and security of affected computers. (Symantec Corporation, 2009)The number both web based attack of 2009 was the Microsoft net profit Explorer ADODB.Stream Object file trigger weakness. This exploit accounted for 18% of the total number of web based exploits for the year.This photograph allows taxis to order cattish files on a undefendable computer when a user visits a website hosting an exploit. In order for this attack to be successful, an attacker must exploit an arbitrary vulner skill that bypasses profits Explorer bail settings.Then the attacker can execute the malicious files that were installed by the initial security weakness. Thi s vulnerability has been kn sustain since 2003, and patches have been released since 2004. This exploit exposes the accompaniment that many computer systems were not creation kept up to date. (Symantec Corporation, 2009)The number third most common web based exploit of 2009 was the Microsoft Internet Explorer 7 uninitialized memory code feat vulnerability. This attack works by enticing a victim to open a malicious web page. Once a user opens the web page it gives the attacker the ability to execute remote code on the victims computer. Since this is a browser based attack, it gives the hacker potentially more targets than relying on a plugin that may not get installed. (Symantec Corporation, 2009)The solve 3 Malware attacks of 2013 were W32.Downadup, W32.Sality, and W32.Ramnit. Although their names all beat with W32., each bug has its own way of exploiting a system. Lets take for instance the W32.Downadup. Thisworm has been well-nigh since 2008. This worm spreads by taking wag es of a remote code execution vulnerability found in Microsoft Windows host service RFC. This worm strives to block entryway to security related web sites fleck attempting to spread to protected network shares via living creature force of weak passwords. The certificate of the full(a) network is at stake with this worm. This computer virus demonstrates shows how important it is to keep servers and workstations updated with the latest virus definitions. (W32.Downadup.B, n.d.) The W32.Ramnit has been around since 2010. This worm is spread by soiling executable drives and removable drives. This malware steals bank usernames and passwords.Having a security policy prohibiting personal drives from existence used in the workplace is paramount. This display case of attack could cause data injustice if unmitigated. (Symantec Corporation, 2013) The W32.Sality is in my opinion the nastiest of all trine bugs. What makes the W32.Sality particularly nasty is that it can infect executab le files on local, removable, and shared drives. W32.Sality is cognize as an (EPO) or entry localize obscuring polymorphic file infector. Essentially, its a sophisticate worm-like virus that ensures its survival by downloading other malware and disabling security software. whiz of the most damaging features of the W32.Sality virus is how it decentralizes accomplice to peer networks with sophisticated code focus that populates the network with infected computers. (W32.Sality., n.d.)ReferencesW32.Downadup.B. (n.d.). Retrieved June 26, 2014, from http//www.symantec.com/security_response/writeup.jsp?docid=2008-123015-3826-99 W32.Ramnit. (n.d.). Retrieved June 26, 2014, from http//www.symantec.com/security_response/writeup.jsp?docid=2010-011922-2056-99 W32.Sality. (n.d.). Retrieved June 26, 2014, from http//www.symantec.com/security_response/writeup.jsp?docid=2006-011714-3948-99 Symantec Corporation. (2009). Symantec Global Internet Security Threat Report Trends for 2009. people t hinking Symantec Corporation. Symantec Corporation. (2013). Symantec Global Internet Security Threat Report Trends for 2009. Mountain View Symantec Corporation.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.